Every alert in Threat Triage arrives pre-investigated. AI Triage findings, MITRE mapping, refractive reasoning analysis, analysts close cases in minutes instead of hours.
Inbox Threat Ops gives each role the signals they care about, without switching tools or rebuilding dashboards.
Targeted insights on email threats and attack patterns.
| $ Risk | Sender | Subject | Status | Sophistication |
|---|---|---|---|---|
| $15K | j.morgan@info-deals… | I found this useful resource | Inbox Quarantined | Crafted |
| $50K ↗ | mark.chen@docusing-secure.com | Sharing a relevant doc | Released | Engineered |
| $50K ↗ | treasury@henderson… | Quick question on the contract | Quarantined | Orchestrated |
| $5K | share@files-secure.io | Thought this might help | Auto Quarantined | Crafted |
Each row surfaces the metadata an analyst needs at a glance, risk dollarization, sender, recipients (stacked when a campaign hits multiple inboxes), priority, status, verdict, and sophistication tier (T1–T5).
Search, filter, customize columns, and paginate up to 50 alerts per page. A live banner at the top shows total emails analyzed in real time.
Every alert opens with a prioritized list of the most important indicators, embedded QR codes, malicious phishing domains, credential-theft intent, lookalike domain registrations.
Findings are color-coded by severity. The count is visible up front so analysts can scan the queue, not the email body.
Hey, quick one before the morning. Need to confirm the Henderson contract wire amount before Tom signs off in his 8am.
Treasury moved the correspondent bank last Thursday.
Click any threat to open a dual-pane view. Email preview with secured headers and content on the left. Threat analysis, Type, Intent, MITRE ATT&CK mappings, impersonated brands, found source, on the right.
Queue navigation lets you move between alerts without leaving the panel.
An expandable section covers refractive reasoning across four dimensions, MITRE mappings, sophistication tier, dollarized risk, headers, indicators, and raw EML.
Independent analysis across four dimensions to reduce false positives and explain threat classification.
Multi-recipient wire-routing redirect. If acted on, $50K+ mid-month vendor payment routes to attacker-controlled account.
Mark false positive, release to user, or sweep similar, directly from the panel. Bulk actions let you select multiple threats and apply a verdict in one move.
Keyboard shortcuts close the loop for analysts working a queue at speed.
Fifteen-minute walkthrough on alerts from your own environment. Watch TRACE pre-investigate the same emails your SOC is fighting today.